Browse Source

Forgot to add this in the prior update. Didn't notice until I saw the dates.

Updates to CI/CD and some link cleanup/backlog sorting. If you're reading this in the new year, hope it's going good so far.
pull/33/head
Robert 2 years ago
committed by GitHub
parent
commit
6e9f3fc15a
No known key found for this signature in database GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 122 additions and 18 deletions
  1. +122
    -18
      Draft/Building_A_Lab.md

+ 122
- 18
Draft/Building_A_Lab.md View File

@ -49,6 +49,8 @@
* This page is supposed to be a collection of resources for building a lab for performing various security related tasks. Generally, the idea is that you setup a local VM hypervisor software(VMware, Virtualbox) and then install a virtual machine to perform testing and analysis without any impact to your "physical" machine.
* **Useful links**
* [Warming Up. Using ATT&CK for Self Advancement - Adam Swan](https://socprime.com/en/blog/warming-up-using-attck-for-self-advancement/)
* [Jeff McJunkins 'Build a Kickass Lab' Presentation](https://bit.ly/kickasslab)
* I don't like link shorteners, but we all know where he works so... Plus he was nice to me one time. So that clearly establishes him as being legit.
* **Building a Dropbox**
* **Articles/Blogposts/Writeups**
* [DigiDucky - How to setup a Digispark like a rubber ducky](http://www.redteamr.com/2016/08/digiducky/)
@ -333,6 +335,8 @@
* [PAW deployment guide - Jian Yan(2018)](https://blogs.technet.microsoft.com/datacentersecurity/2018/04/30/paw-deployment-guide/)
* This blogpost only focusses on one aspect, which is the PAW deployment, including the backend servers.
* [Step-by-Step Guide to install Active Directory in Windows Server 2019 (PowerShell Guide) - Disham M. Francis(2018)](http://www.rebeladmin.com/2018/10/step-step-guide-install-active-directory-windows-server-2019-powershell-guide/)
* [Lab Building Guide: Virtual Active Directory - Vartai Security(2020)](https://medium.com/@vartaisecurity/lab-building-guide-virtual-active-directory-5f0d0c8eb907)
* [Building a lab with Server 2019 Server Core and PowerShell …then attacking it! - Neil Lines(2020)](https://www.pentestpartners.com/security-blog/building-a-lab-with-server-2019-server-core-and-powershell-then-attacking-it/)
* **AWS**
* [Active Directory Domain Services on the AWS Cloud: Quick Start Reference Deployment - docs.aws](https://docs.aws.amazon.com/quickstart/latest/active-directory-ds/welcome.html)
* [Active Directory Domain Services on AWS](https://aws.amazon.com/quickstart/architecture/active-directory-ds/)
@ -344,7 +348,17 @@
* [Disruption](https://github.com/xFreed0m/Disruption/)
* Disruption is a code for Terraform to deploy a small AD domain-based environment in Azure. The environment contains two domain controllers (Windows Server 2012), Fileserver + Web server (Windows Server 2019), Windows 7 client, Windows 10 client, and kali Linux machine. They are connected to the same subnet. Each windows machine has some packages being installing during deployment (the list can be viewed and modified here: chocolist). All the needed configurations (Domain creation, DC promotion, joining the machines to the domain and more are automated and part of the deployment. However, there are more improvments to be added (creating OUs, Users, and stuff like that. I'll might get to it in the future, or, you will submit a pull request :))
* **Lab Generation**<a name="alabgen">
* **Personal Opinion**
* __My Guide to Building your own AD Lab with 0 effort.__
1. Use an automated lab creation solution/script.
2. Populate it using [BadBlood](https://github.com/davidprowe/BadBlood)
3. Add misconfigurations to it: https://medium.com/@vartaisecurity/lab-building-guide-virtual-active-directory-5f0d0c8eb907
* **Articles**
* [Manage Active Directory Objects with the New Windows AD Provider for HashiCorp Terraform(2020)](https://www.hashicorp.com/blog/manage-active-directory-objects-new-windows-ad-provider-hashicorp-terraform)
* [Windows Server Administration for Beginners - IT & Software(Youtube)](https://www.youtube.com/watch?v=hZ2QiiHyTnU)
* **Tools**
* [Active Directory Auto Deployment of Tiers in any environment - David Rowe](https://github.com/davidprowe/AD_Sec_Tools)
* "This code is written in PowerShell and requires the AD commandlets to run. The current scripts in the repo: create a tiered structured in an active directory environment, create tiered groups with very granular permissions on the domain and create ACL permissions on the OUs based on the name of the group."
* [WSLab - Official Microsoft Stuff](https://github.com/microsoft/WSLab)
* Windows Server rapid lab deployment scripts
* [AutomatedLab](https://github.com/AutomatedLab/AutomatedLab)
@ -354,10 +368,18 @@
* [Invoke-ADLabDeployer](https://github.com/outflanknl/Invoke-ADLabDeployer)
* Automated deployment of Windows and Active Directory test lab networks. Useful for red and blue teams.
* [Blogpost](https://outflank.nl/blog/2018/03/30/automated-ad-and-windows-test-lab-deployments-with-invoke-adlabdeployer/))
* [ADLab](https://github.com/browninfosecguy/ADLab)
* PS Script for creating an AD lab quickly
* [Blogpost](https://browninfosecguy.com/Active-Directory-Lab-Setup-Tool)
* [Purple Cloud](https://github.com/iknowjason/PurpleCloud)
* An Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.
* **Domain Generator**<a name="adg"></a>
* **Tools**
* [BadBlood](https://github.com/davidprowe/BadBlood)
* BadBlood by Secframe fills a Microsoft Active Directory Domain with a structure and thousands of objects. The output of the tool is a domain similar to a domain in the real world. After BadBlood is ran on a domain, security analysts and engineers can practice using tools to gain an understanding and prescribe to securing Active Directory. Each time this tool runs, it produces different results. The domain, users, groups, computers and permissions are different. Every. Single. Time.
* **Fake Data Generation**
* [faker](https://github.com/joke2k/faker)
* Faker is a Python package that generates fake data for you. Whether you need to bootstrap your database, create good-looking XML documents, fill-in your persistence to stress test it, or anonymize data taken from a production service, Faker is for you.
* **Forest Generation**<a name="afg"></a>
* **Talks/Presentations/Videos**
* [How To Create An Active Directory Forest With PowerShell - Adam Bertram(2018)](https://www.youtube.com/watch?v=bWF1-rhPh5E)
@ -373,6 +395,8 @@
* When you need to simulate a real Active Directory with thousands of users you quickly find that creating realistic test accounts is not trivial. Sure enough, you can whip up a quick PowerShell one-liner that creates any number of accounts, but what if you need real first and last names? Real (existing) addresses? Postal codes matching phone area codes? I could go on. The point is that you need two things: input files with names, addresses etc. And script logic that creates user accounts from that data. This blog post provides both.
* [youzer](https://github.com/SpiderLabs/youzer)
* Fake User Generator for Active Directory Environments
* [AzDummy](https://github.com/daddycocoaman/AzDummy)
* A Python Typer-based CLI tool to generate fake data for Azure AD.
* **User Simulation**<a name="aus"></a>
* **Tools**
* [sheepl](https://github.com/SpiderLabs/sheepl)
@ -422,8 +446,6 @@
* [Privilege-Escalation](https://github.com/Ignitetechnologies/Privilege-Escalation)
* Collection of VMs aimed at teaching different privilege escalation techniques with Vulnhub machines used for examples.
* [Emulating ARM Router Firmware - Azeria](https://azeria-labs.com/emulating-arm-firmware/)
* [Offensive Development with GitHub Actions - MDSec](https://www.mdsec.co.uk/2020/03/offensive-development-with-github-actions/)
* **Offensive Monitoring**
* **Articles/Blogposts/Writeups**
* [Automating a RedELK Deployment Using Ansible - Jason Lang(2020)](https://www.trustedsec.com/blog/automating-a-redelk-deployment-using-ansible/)
@ -476,6 +498,10 @@
@ -495,7 +521,11 @@
* [Webcast: Windows logging, Sysmon, and ELK - BHIS(2019)](https://www.blackhillsinfosec.com/webcast-windows-logging-sysmon-and-elk/)
* [Webcast: Let’s Talk About ELK Baby, Let’s Talk About You and AD - BHIS(2020)](https://www.blackhillsinfosec.com/webcast-lets-talk-about-elk-baby-lets-talk-about-you-and-ad/)
* This webcast is going to demonstrate an integration between our ongoing Windows baseline best practices configuration and improving your endpoint optics. But first, we’re going to summarize some previous webcasts, their content, and the order in which they should be reviewed to tie all of these things together. Then, with all the baseline content and configuration options summarized, we are going to help you put a bow on all that, just in time for the Holidays.
* [Virtual Smart Cards for Lab Environments - Eddie David(Derbycon2019)](https://www.irongeek.com/i.php?page=videos/derbycon9/stable-40-virtual-smart-cards-for-lab-environments-eddie-david)
* Have you ever wanted to learn what a virtual smart card is? How to set them up? Are you running gear in your lab with no TPM security chips? This is something unique that I do for my lab environments with Hyper-V. It's very real world as there are high security organizations out there that do use smart cards.This talk will dive into what is minimally involved to set this environment up so you can run your labs in a password less way.
* **Application Whitelisting**
* **WDAC**
* [Building a Windows Defender Application Control Lab - FortyNorthSecurity(2018)](https://fortynorthsecurity.com/blog/building-a-windows-defender-application-control-lab/)
* **Elastic Search + Log Forwarder/Parser + Kibana**<a name="elk"></a>
* **101**
* **Articles/Blogposts/Writeups**
@ -524,23 +554,33 @@
* **Articles/Blogposts/Writeups**
* [How To Do Endpoint Monitoring on a Shoestring Budget – Webcast Write-Up - Joff Thyer, Derek Banks](https://www.blackhillsinfosec.com/endpoint-monitoring-shoestring-budget-webcast-write/)
* [Azure Sentinel To-Go: Sentinel Lab w/ Prerecorded Data 😈 & a Custom Logs Pipe via ARM Templates 🚀 - Cyb3rWard0g](https://techcommunity.microsoft.com/t5/azure-sentinel/azure-sentinel-to-go-sentinel-lab-w-prerecorded-data-amp-a/ba-p/1260191)
* [Building a SIEM: centralized logging of all Linux commands with ELK + auditd - Security Shenanigans(2020)](https://securityshenaningans.medium.com/building-a-siem-centralized-logging-of-all-linux-commands-with-elk-auditd-3f2e70503933)
* [How To Deploy Windows Optics: Commands, Downloads, Instructions, and Screenshots - Jordan Drysdale & Kent Ickler(2020)](https://www.blackhillsinfosec.com/how-to-deploy-windows-optics-commands-downloads-instructions-and-screenshots/)
* [How To: Applied Purple Teaming Lab Build on Azure with Terraform (Windows DC, Member, and HELK!) - Jordan Drysdale & Kent Ickler(2020)](https://www.blackhillsinfosec.com/how-to-applied-purple-teaming-lab-build-on-azure-with-terraform/)
* **Talks/Presentations/Videos**
* [Build your own threat hunting based on open-source tools - Teymur Kheirkhabarov(PHDays2018)](https://speakerdeck.com/heirhabarov/phdays-2018-threat-hunting-hands-on-lab)
* [Building a Home Network Configured to Collect Artifacts for Supporting Network Forensic Incident Response](https://www.sans.org/reading-room/whitepapers/forensics/building-home-network-configured-collect-artifacts-supporting-network-forensic-incident-response-37302)
* **Tools**
* [DetectionLab](https://github.com/clong/DetectionLab)
* [...]to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts.
* [ELK Detection Lab](https://github.com/thomaspatzke/elk-detection-lab)
* An ELK environment loaded with the following datasets: Mordor from Roberto Rodriguez @Cyb3rWard0g and Jose Luis Rodriguez @Cyb3rPandaH; EVTX-ATTACK-SAMPLES from Samir Bousseaden SBousseaden; malware-traffic-analysis.net PCAPs from @malware_traffic processed with Suricata.
* [SweetSecurity](https://github.com/TravisFSmith/SweetSecurity)
* Scripts to setup and install Bro IDS, Elastic Search, Logstash, Kibana, and Critical Stack on a Raspberry Pi 3 device
* [Response Operation Collections Kit Reference Build](https://github.com/rocknsm/rock)
* [Mordor](https://github.com/Cyb3rWard0g/mordor)
* The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption. The pre-recorded data is categorized by platforms, adversary groups, tactics and techniques defined by the Mitre ATT&CK Framework. The pre-recorded data represents not only specific known malicious events but additional context/events that occur around it. This is done on purpose so that you can test creative correlations across diverse data sources, enhancing your detection strategy and potentially reducing the number of false positives in your own environment.
* [RedELK](https://github.com/outflanknl/RedELK)
* Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability for the Red Team in long term operations.
* [Adaz: Active Directory Hunting Lab in Azure](https://github.com/christophetd/Adaz)
* This project allows you to easily spin up Active Directory labs in Azure with domain-joined workstations, Windows Event Forwarding, Kibana, and Sysmon using Terraform/Ansible.
* **Lab-Creation/Generation**
* [DetectionLab](https://github.com/clong/DetectionLab)
* [...]to allow the user to quickly build a Windows domain that comes pre-loaded with security tooling and some best practices when it comes to system logging configurations. It can easily be modified to fit most needs or expanded to include additional hosts.
* [ELK Detection Lab](https://github.com/thomaspatzke/elk-detection-lab)
* An ELK environment loaded with the following datasets: Mordor from Roberto Rodriguez @Cyb3rWard0g and Jose Luis Rodriguez @Cyb3rPandaH; EVTX-ATTACK-SAMPLES from Samir Bousseaden SBousseaden; malware-traffic-analysis.net PCAPs from @malware_traffic processed with Suricata.
* [HELK](https://github.com/Cyb3rWard0g/HELK)
* The Hunting ELK or simply the HELK is one of the first open source hunt platforms with advanced analytics capabilities such as SQL declarative language, graphing, structured streaming, and even machine learning via Jupyter notebooks and Apache Spark over an ELK stack. This project was developed primarily for research, but due to its flexible design and core components, it can be deployed in larger environments with the right configurations and scalable infrastructure.
* [SweetSecurity](https://github.com/TravisFSmith/SweetSecurity)
* Scripts to setup and install Bro IDS, Elastic Search, Logstash, Kibana, and Critical Stack on a Raspberry Pi 3 device
* [Response Operation Collections Kit Reference Build](https://github.com/rocknsm/rock)
* [RedELK](https://github.com/outflanknl/RedELK)
* Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability for the Red Team in long term operations.
* [Defensive Origins - Lab Build Scripts](https://github.com/DefensiveOrigins/DomainBuildScripts)
* This repo contains build scripts for Defensive Origin's various lab environments.
* **Datasets/Generation**
* [Mordor](https://github.com/Cyb3rWard0g/mordor)
* The Mordor project provides pre-recorded security events generated by simulated adversarial techniques in the form of JavaScript Object Notation (JSON) files for easy consumption. The pre-recorded data is categorized by platforms, adversary groups, tactics and techniques defined by the Mitre ATT&CK Framework. The pre-recorded data represents not only specific known malicious events but additional context/events that occur around it. This is done on purpose so that you can test creative correlations across diverse data sources, enhancing your detection strategy and potentially reducing the number of false positives in your own environment.
* **Linux**
* [auditd - Neo23x0](https://github.com/Neo23x0/auditd)
* Best Practice Auditd Configuration
* **Windows Domain**<a name="bwd"></a>
* **Articles/Blogposts/Writeups**
* [Microsoft-Blue-Forest](https://github.com/rootsecdev/Microsoft-Blue-Forest)
@ -552,7 +592,17 @@
* **In the Clouds**
* [Securing Azure Infrastructure - Hands on Lab Guide - Adam Raffle, Tom Wilde](https://github.com/Araffe/azure-security-lab)
* [Response Operation Collections Kit Reference Build](https://github.com/rocknsm/rock)
* [Applied Purple Teaming Threat Optics Lab - Azure TerraForm](https://github.com/DefensiveOrigins/APT-Lab-Terraform)
* [Adaz: Active Directory Hunting Lab in Azure](https://github.com/christophetd/Adaz)
* This project allows you to easily spin up Active Directory labs in Azure with domain-joined workstations, Windows Event Forwarding, Kibana, and Sysmon using Terraform/Ansible.
* [SimuLand](https://github.com/OTRF/SimuLand)
* Cloud Templates and scripts to deploy mordor environments. An initiative from the Open Threat Research (OTR) community to share cloud templates and scripts to deploy network environments to simulate adversaries, generate/collect data and learn more about adversary tradecraft from a defensive perspective. The difference with other environments is that we do not have one scenario to cover all use-cases, but multiple modular environments that adapt to specific topics of research.
* **Fake Data Generation**
* [Ps-Whitenoise](https://github.com/DefensiveOrigins/ps-whitenoiseweb)
* Powershell - web traffic whitenoise generator
* **Other**
* [elk-hole](https://github.com/nin9s/elk-hole)
* Pi-hole data visualization using Elasticsearch, Logstash and Kibana. elk-hole provides the relevant files and configuration to easily visualize pi-holes/dnsmasq statistics via the popular elasticstack.
@ -577,6 +627,9 @@
* 'List of "only yours" cloud services for everyday needs'
* **Access Methods**<a name="oam"></a>
* **RDP**
* [Apache Guacomole](https://guacamole.apache.org/)
* Apache Guacamole is a clientless remote desktop gateway. It supports standard protocols like VNC, RDP, and SSH. We call it clientless because no plugins or client software are required. Thanks to HTML5, once Guacamole is installed on a server, all you need to access your desktops is a web browser.
* [Apache Guacamole: How To Install and Configure - FortyNorth Security](https://fortynorthsecurity.com/blog/apache-guacamole-how-to-install-and-configure/)
* [xrdp](https://github.com/neutrinolabs/xrdp)
* xrdp provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp accepts connections from a variety of RDP clients: FreeRDP, rdesktop, NeutrinoRDP and Microsoft Remote Desktop Client (for Windows, Mac OS, iOS and Android).
* **SSH**
@ -628,13 +681,64 @@
* **macOS**
* [MicroMDM](https://micromdm.io/)
* MicroMDM is a project which provides an open source Mobile Device Management server for Apple devices. Our goal is to create a performant and extensible device management solution for enterprise and education.
* **Defensive CI/CD**<a name="dcicd"></a>
* **F**
* See [Programming/Appsec.md](#./Programming_Language_Security.md)
* **Offensive CI/CD**<a name="ocicd"></a>
* **Agnostic(not really) Talks**
* [Offensive Development: How To DevOps Your Red Team - Dominic Chell(BSidesMCR2019)](https://www.youtube.com/watch?v=n5_V61NI0tA)
* [OffSecOps – Will Schroeder (SO-CON 2020)](https://www.youtube.com/watch?v=XaICChBJMck&list=PLJK0fZNGiFU-2vFpjnt96j_VSuQVTkAnO&index=2)
* As the offensive industry continues to mature in reaction to the progression of its defensive counterpart, offensive teams have increasingly integrated DevOps practices to mature their operations. In this talk, we'll describe our approach to building an offensive continuous integration (CI) pipeline, including our architecture and lessons learned. We'll show how tracking of (unique) artifacts per engagement, proactive scanning for artifacts submitted by defenders to cloud analysis platforms, integrated obfuscation, OPSEC scanning of artifacts, and seamless integration of the build process into existing C2 frameworks (like Cobalt Strike) can all be accomplished with free installations of Jenkins and Artifactory on your own (non-cloud) hardware. Come learn how to up your artifact game!
* [Offensive Development: Post Exploitation Tradecraft in an EDR World - Dominic Chell(x33fCon2020)](https://www.youtube.com/watch?v=GHmOJhpMw_o)
* You spend days or even weeks perfecting the perfect phish; your campaign has a targeted pre-text, a slick initial access payload and it slips through perimeter defences right in to your target's inbox. Moments later, your C2 pings and your beacon is awake - you're in, it's time to explore! You start by probing the endpoint, checking your privileges and getting your bearings in the network. Suddenly, silence... your beacon has stopped responding, your infrastructure is burned and you have to start over. Command line logging, PowerShell logging, sysmon, EDR, EDP, app whitelisting, AMSI, the blue team has it all and you're playing on their turf. Unless your post-exploitation game is at it's peak, you shall not pass. During this talk we will explore post-exploitation tradecraft, reviewing the opsec pitfalls that commonly lead to detection in mature environments as well as how to significantly reduce the indicators of compromise. It will demonstrate how DevOps principles can be applied to red teaming, focusing on the implementation of a custom CI/CD pipeline to automatically consume, build and deploy existing and custom tooling to an environment in a manner agnostic to any command and control framework. This approach also provides the operator with the capability to programmatically and automatically protect their tools from DFIR, safeguarding intellectual property and operational infrastructure when an artifact is dropped to disk. The future of red teaming is offensive development.
* **AMSI Automation**
* **Aritcles/Blogposts/Writeups**
* [AMSI as a Service — Automating AV Evasion - James](https://web.archive.org/web/20200524074312/https://medium.com/@two06/amsi-as-a-service-automating-av-evasion-2e2f54397ff9)
* **Tools**
* [AMSI_Handler](https://github.com/two06/AMSI_Handler)
* Automate AV evasion by calling AMSI
* **CI/CD with Azure Pipelines**
* **101**
* [Azure Pipelines](https://azure.microsoft.com/en-us/services/devops/pipelines/)
* [What is Azure Pipelines? - docs.ms](https://docs.microsoft.com/en-us/azure/devops/pipelines/get-started/what-is-azure-pipelines?view=azure-devops)
* [Azure Pipelines documentation - docs.ms](https://docs.microsoft.com/en-us/azure/devops/pipelines/?view=azure-devops)
* **Aritcles/Blogposts/Writeups**
* [Using Azure Pipelines to validate my Sysmon configuration - Olaf Harton(2020)](https://medium.com/falconforce/using-azure-pipelines-to-validate-my-sysmon-configuration-48315dba7571)
* [Testing your RedTeam Infrastructure - Adam Chester(2020)](https://blog.xpnsec.com/testing-redteam-infra/)
* In this post I'm going to start with a quick review of how RedTeam infrastructure is defined in code which would typically live in a Git repo somewhere. More importantly however, we will continue this by looking at ways in which our environments can be tested as they evolve and increase in complexity, finishing with a walkthrough of how we can introduce a CI pipeline into the mix to help automate this testing.
* **CI/CD with Github**
* **101**
* [Github Actions Documentation](https://docs.github.com/en/free-pro-team@latest/actions)
* **Aritcles/Blogposts/Writeups**
* [An Introduction to Github Actions - Gabriel Tanner(2019)](https://gabrieltanner.org/blog/an-introduction-to-github-actions)
* [Building Tooling With GitHub Actions - James(2019)](https://web.archive.org/web/20200114181339/https://medium.com/@two06/building-tooling-with-github-actions-59401648e61d)
* [Offensive Development with GitHub Actions - James Williams(2020)](https://www.mdsec.co.uk/2020/03/offensive-development-with-github-actions/)
* **CI/CD with Jenkins**
* **101**
* [Jenkins](https://www.jenkins.io/)
* open source automation server
* [Getting started with the Guided Tour - jenkins.io](https://www.jenkins.io/doc/pipeline/tour/getting-started/)
* [What Is Jenkins? How & Why To Use It? - Himanshu Sheth(2020)](https://www.lambdatest.com/blog/what-is-jenkins/)
* **Aritcles/Blogposts/Writeups**
* [Learn How to Set Up a CI/CD Pipeline From Scratch - Samarpit Tuli(2018)](https://dzone.com/articles/learn-how-to-setup-a-cicd-pipeline-from-scratch)
* [CI/CD Pipeline using Jenkins and Gogs - Vishnu(2020)](https://www.sparksupport.com/blog/2020/02/11/ci-cd-pipeline-using-jenkins-and-gogs-tutorial/)
* [Jenkins - More than Just Target Practice - FortyNorth Security](https://fortynorthsecurity.com/blog/jenkins-more-than-just-target-practice/)
* [Jenkins Multibranch Pipeline Tutorial For Beginners - Bibin Wilson(2020)](https://devopscube.com/jenkins-multibranch-pipeline-tutorial/)
* [Jenkins Automated Build Trigger On Github Pull Request - devopscube(2020)](https://devopscube.com/jenkins-build-trigger-github-pull-request/)
* **Talks/Presentations/Videos**
* [OffSecOps – Will Schroeder (SO-CON 2020)](https://www.youtube.com/watch?v=XaICChBJMck&list=PLJK0fZNGiFU-2vFpjnt96j_VSuQVTkAnO&index=2)
* As the offensive industry continues to mature in reaction to the progression of its defensive counterpart, offensive teams have increasingly integrated DevOps practices to mature their operations. In this talk, we'll describe our approach to building an offensive continuous integration (CI) pipeline, including our architecture and lessons learned. We'll show how tracking of (unique) artifacts per engagement, proactive scanning for artifacts submitted by defenders to cloud analysis platforms, integrated obfuscation, OPSEC scanning of artifacts, and seamless integration of the build process into existing C2 frameworks (like Cobalt Strike) can all be accomplished with free installations of Jenkins and Artifactory on your own (non-cloud) hardware. Come learn how to up your artifact game!
* **Policy Enforcement**
* [Leveraging DevSecOps Practices to Secure Red Team Infrastructure - Jesse Somerville(2020)](https://www.praetorian.com/blog/leveraging-devsecops-practices-to-manage-red-team-infrastructure)
-------------------------------------------------------
### Infrastructure Automation <a name="remote"></a>
* **Remote Access**
* [Creating an Internal Pen Test VM with Ngrok - FortyNorthSecurity(2020)](https://fortynorthsecurity.com/blog/ngrok-internal-pen-test-vm/)


Loading…
Cancel
Save